ICTNWK506 Configure, verify and troubleshoot WAN links and IP services in a medium enterprise network - Assessment
VerifiedAdded on 2024/07/12
|24
|3869
|346
AI Summary
This assessment covers the configuration, verification, and troubleshooting of WAN links and IP services in a medium enterprise network. It includes questions on pre-deployment assessments, network design, security considerations, WAN protocols, VPN configuration, ADSL setup, DHCP operation, NAT configuration, access control lists, and troubleshooting techniques. The assessment also addresses relevant legislation, work health and safety codes, and network documentation practices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ICTNWK506
Configure, verify and troubleshoot WAN links
and IP services in a medium enterprise network
ASSESSMENT
Configure, verify and troubleshoot WAN links
and IP services in a medium enterprise network
ASSESSMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................2
Question 3..................................................................................................................................3
Question 4..................................................................................................................................5
Question 5..................................................................................................................................5
Question 6..................................................................................................................................5
Question 7..................................................................................................................................7
Question 8..................................................................................................................................7
Question 9..................................................................................................................................7
Question 10................................................................................................................................7
Question 11................................................................................................................................8
Question 12................................................................................................................................8
Question 13................................................................................................................................8
Question 14................................................................................................................................9
Question 15................................................................................................................................9
Question 16................................................................................................................................9
Question 17..............................................................................................................................10
Question 18..............................................................................................................................10
Question 19..............................................................................................................................11
Question 20..............................................................................................................................13
Question 22..............................................................................................................................15
Question 23..............................................................................................................................15
Question 24..............................................................................................................................16
Question 25..............................................................................................................................16
Question 26..............................................................................................................................16
Question 27..............................................................................................................................17
Question 28..............................................................................................................................17
Question 29..............................................................................................................................18
Question 30..............................................................................................................................18
Question 31..............................................................................................................................19
References................................................................................................................................ 20
Question 1..................................................................................................................................2
Question 2..................................................................................................................................2
Question 3..................................................................................................................................3
Question 4..................................................................................................................................5
Question 5..................................................................................................................................5
Question 6..................................................................................................................................5
Question 7..................................................................................................................................7
Question 8..................................................................................................................................7
Question 9..................................................................................................................................7
Question 10................................................................................................................................7
Question 11................................................................................................................................8
Question 12................................................................................................................................8
Question 13................................................................................................................................8
Question 14................................................................................................................................9
Question 15................................................................................................................................9
Question 16................................................................................................................................9
Question 17..............................................................................................................................10
Question 18..............................................................................................................................10
Question 19..............................................................................................................................11
Question 20..............................................................................................................................13
Question 22..............................................................................................................................15
Question 23..............................................................................................................................15
Question 24..............................................................................................................................16
Question 25..............................................................................................................................16
Question 26..............................................................................................................................16
Question 27..............................................................................................................................17
Question 28..............................................................................................................................17
Question 29..............................................................................................................................18
Question 30..............................................................................................................................18
Question 31..............................................................................................................................19
References................................................................................................................................ 20
Question 1
In order to plan for a Wan link installation for public and private. We need to configure the
serial and passed Ethernet codes. We need to plan the security for network and the Firewalls.
There are some steps to prepare for the WAN Network.
(a) Conduct Pre-Deployment and Readiness Assessments
(b) Shift the Network Management Focus
(c) Determine Priorities
(d) Consider ISP Redundancy
Question 2
In order to plan for a Wan link installation for public and private. We need to configure the
serial and passed Ethernet codes. We need to plan the security for network and the Firewalls.
There are some steps to prepare for the WAN Network.
(a) Conduct Pre-Deployment and Readiness Assessments
(b) Shift the Network Management Focus
(c) Determine Priorities
(d) Consider ISP Redundancy
Question 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 3
a) Network address translation (NAT)
b) Dynamic host configuration protocol (DHCP)
c) Access control lists (ACLs)
a) Network address translation (NAT)
b) Dynamic host configuration protocol (DHCP)
c) Access control lists (ACLs)
d) Configure and troubleshoot ADSL links
e) Configure and troubleshoot VPNs
It stands for virtual private network.
e) Configure and troubleshoot VPNs
It stands for virtual private network.
Question 4
For NAT Configuration we configure the interface – of Nat on either interface enabling the
network security. We can have multiple computers on the internal network connected to a
public IP address and vice versa. In DHCP we configure the services on server creating
pools with different subnets for IP address, each range is different and helps in creating
redundancy. ADSL – Asymmetric subscriber line is used to connect the internet, we could
use PPPoE or IP address format to connect internet. VPN can be configured on routing and
remote access on the server and each server will have access to the network moreover some
of the features chaps is the protocol and connection is made to establish connection remotely
Question 5
Security passes, login details, network resources shared, IP configuration map, for NAT we
needed to get IP address tables for connection and translation, On VPN we need the server to
connect the server and connections, ADSL we need to configure the phone ADSL, pope
connections, and others.
Question 6
Legislations: There are various rules that are applied to the networks and computers. The
acts under this are as under:
For NAT Configuration we configure the interface – of Nat on either interface enabling the
network security. We can have multiple computers on the internal network connected to a
public IP address and vice versa. In DHCP we configure the services on server creating
pools with different subnets for IP address, each range is different and helps in creating
redundancy. ADSL – Asymmetric subscriber line is used to connect the internet, we could
use PPPoE or IP address format to connect internet. VPN can be configured on routing and
remote access on the server and each server will have access to the network moreover some
of the features chaps is the protocol and connection is made to establish connection remotely
Question 5
Security passes, login details, network resources shared, IP configuration map, for NAT we
needed to get IP address tables for connection and translation, On VPN we need the server to
connect the server and connections, ADSL we need to configure the phone ADSL, pope
connections, and others.
Question 6
Legislations: There are various rules that are applied to the networks and computers. The
acts under this are as under:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Communications (2003): This rule protects the improper or illegal use of the services of
public communications.
Computer Misuse (1990): This rule protects the computers and data from any interference
and unauthorized access.
Investigatory Power (2016): This rule controls the traffic interception occurring on the
networks. It provides powers to investigating authorities and police to obtain information
about their users and usage.
Data Protection (2018): It establishes the requirements to the person that have personal
data on any system.
Police and Justice (2006): This rule has created various new types of offences related to
obtaining, supplying and making of tools that are used in the computer misuse rule of
1990 (Jisc, 2015).
Work Health and Safety codes: There are obligations for ensuring the safety and health of
the employees working. For this, certain standards and regulations are needed for the
workplace.
Ensure handling of hazardous materials safely at the workplace. For this, learn using,
storing, handling, labelling and disposing of them correctly.
Use tools and resources that help the company to comply with the health and safety
requirements of the workplace.
Regulations and Standards used: In this, we have used network codes and regulations for
the networking. They are as under:
Network Codes: These are the Industry codes. Some of the codes are as
under:
1. Billing Accuracy and Call Charging
2. Deployment rules of Local Loop service, etc
Network Standards: There are standards set by the government related to
the interconnection facilities in the telecommunications (Acme, 2017).
public communications.
Computer Misuse (1990): This rule protects the computers and data from any interference
and unauthorized access.
Investigatory Power (2016): This rule controls the traffic interception occurring on the
networks. It provides powers to investigating authorities and police to obtain information
about their users and usage.
Data Protection (2018): It establishes the requirements to the person that have personal
data on any system.
Police and Justice (2006): This rule has created various new types of offences related to
obtaining, supplying and making of tools that are used in the computer misuse rule of
1990 (Jisc, 2015).
Work Health and Safety codes: There are obligations for ensuring the safety and health of
the employees working. For this, certain standards and regulations are needed for the
workplace.
Ensure handling of hazardous materials safely at the workplace. For this, learn using,
storing, handling, labelling and disposing of them correctly.
Use tools and resources that help the company to comply with the health and safety
requirements of the workplace.
Regulations and Standards used: In this, we have used network codes and regulations for
the networking. They are as under:
Network Codes: These are the Industry codes. Some of the codes are as
under:
1. Billing Accuracy and Call Charging
2. Deployment rules of Local Loop service, etc
Network Standards: There are standards set by the government related to
the interconnection facilities in the telecommunications (Acme, 2017).
Question 7
The procedures and workplace policies used are a risk assessment, information sensitivity,
audit policy, request for account access, email policy, spam policy etc (Paquet, 2013).
Question 8
On reviewing the existing document of network design it was found that it was difficult to
foresee the requirements of the future, security, growth, efficiency, and capacity. Also, they
have squeezed many computers and another network device into a single logical network. SO
the current network design was incomplete and needs to be updated (Partsenidis, 2003).
Question 9
Technical requirements needed to be the internet connection, Diagnostic tools for network,
bandwidth, software for local caching, Firewalls, filters etc (Bird and Harwood, 2002).
Question 10
a)
For this, we have contacted vendors who sell modem, routers, bridges, hubs, switches,
gateways etc.
b)
The network elements needed for the networking purpose are as under:
S. No Element Specification
1. Modem BCM63168
2. Routers 802.11 a/b/g/n/ac
3. Bridges Quadro M32X
4. Hubs Cisco 1538 Series 10 100 Micro Hub
5. Switches Cisco Catalyst 2960S-24TS-L
6. Wireless Access Points Aironet 1815 Series
7. Gateways Cisco 2900
The procedures and workplace policies used are a risk assessment, information sensitivity,
audit policy, request for account access, email policy, spam policy etc (Paquet, 2013).
Question 8
On reviewing the existing document of network design it was found that it was difficult to
foresee the requirements of the future, security, growth, efficiency, and capacity. Also, they
have squeezed many computers and another network device into a single logical network. SO
the current network design was incomplete and needs to be updated (Partsenidis, 2003).
Question 9
Technical requirements needed to be the internet connection, Diagnostic tools for network,
bandwidth, software for local caching, Firewalls, filters etc (Bird and Harwood, 2002).
Question 10
a)
For this, we have contacted vendors who sell modem, routers, bridges, hubs, switches,
gateways etc.
b)
The network elements needed for the networking purpose are as under:
S. No Element Specification
1. Modem BCM63168
2. Routers 802.11 a/b/g/n/ac
3. Bridges Quadro M32X
4. Hubs Cisco 1538 Series 10 100 Micro Hub
5. Switches Cisco Catalyst 2960S-24TS-L
6. Wireless Access Points Aironet 1815 Series
7. Gateways Cisco 2900
Question 11
For installation, there requires a class installer and co-installer, INF files and notify objects.
a)
Identify the elements needed according to technical requirements of the network.
Priorities tasks that are needed & contingency plans so as to achieve the goal.
Identify the human requirement and retrieve the approval for the plans.
b)
No, there was no disruption to clients.
Question 12
a)
The approval was obtained from the CITC. The CITC hold the power of approving. They
approve the LAN usage rules.
b)
The security clearance will be required for the purpose of preventing the access of security
concerns so that they do not gain access to any sensitive assets of government, information,
location etc.
Question 13
a)
Dark Fiber
Metro Ethernet
Broadband
MPLS
Legacy T1 (Froehlich, 2017)
For installation, there requires a class installer and co-installer, INF files and notify objects.
a)
Identify the elements needed according to technical requirements of the network.
Priorities tasks that are needed & contingency plans so as to achieve the goal.
Identify the human requirement and retrieve the approval for the plans.
b)
No, there was no disruption to clients.
Question 12
a)
The approval was obtained from the CITC. The CITC hold the power of approving. They
approve the LAN usage rules.
b)
The security clearance will be required for the purpose of preventing the access of security
concerns so that they do not gain access to any sensitive assets of government, information,
location etc.
Question 13
a)
Dark Fiber
Metro Ethernet
Broadband
MPLS
Legacy T1 (Froehlich, 2017)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 14
The configuration of serial connection is similar to various connection types.
Question 15
The WAN protocols are:
Asynchronous Transfer Mode
Frame Relay
SONET/SDH
X.25
Point-to-Point
Broadband Access
Question 16
a)
It is the technology that is used to create an encrypted and safe connection in an unsecured
network like the internet. It ensures proper security to the system connected in an underlying
infrastructure of the network which is unable to do it. Following are the type of the VPN:
Remote Access VPN: This makes use of the infrastructure of public communication such
as the internet.
Site to site VPN: This makes use of gateway device so as to provide connectivity in the
entire network.
The configuration of serial connection is similar to various connection types.
Question 15
The WAN protocols are:
Asynchronous Transfer Mode
Frame Relay
SONET/SDH
X.25
Point-to-Point
Broadband Access
Question 16
a)
It is the technology that is used to create an encrypted and safe connection in an unsecured
network like the internet. It ensures proper security to the system connected in an underlying
infrastructure of the network which is unable to do it. Following are the type of the VPN:
Remote Access VPN: This makes use of the infrastructure of public communication such
as the internet.
Site to site VPN: This makes use of gateway device so as to provide connectivity in the
entire network.
Question 17
Configuration step of a site-to-site VPN.
Verify the connectivity through LAN.
Allow the IKE policies.
Configure policies of ISAKMP.
Arrange pre-shared keys.
Configure the transform set of IPsec.
Configure the interesting traffic.
Configure the crypto map.
Verify step of a site-to-site VPN.
Verify the configuration of the IPsec.
Show isakmp security.
Show IPsec security.
Produce some boring test traffic & detect the result.
Produce some exciting test traffic & detect the result (Bipin, 2015).
Question 18
Asymmetric digital subscriber line is the internet connection’s type. Nowadays it is used for
streaming multimedia, moderating game, downloading bulky files, and computer design. It
provides a facility that the users can easily use the internet when they are talking to someone
on phone call. It is also used for receiving the faxes and emails. It is the replacement of dial-
up modems. It is also available online. So there is no need of waiting for a connection
(Soffar, 2015).
Configuration step of a site-to-site VPN.
Verify the connectivity through LAN.
Allow the IKE policies.
Configure policies of ISAKMP.
Arrange pre-shared keys.
Configure the transform set of IPsec.
Configure the interesting traffic.
Configure the crypto map.
Verify step of a site-to-site VPN.
Verify the configuration of the IPsec.
Show isakmp security.
Show IPsec security.
Produce some boring test traffic & detect the result.
Produce some exciting test traffic & detect the result (Bipin, 2015).
Question 18
Asymmetric digital subscriber line is the internet connection’s type. Nowadays it is used for
streaming multimedia, moderating game, downloading bulky files, and computer design. It
provides a facility that the users can easily use the internet when they are talking to someone
on phone call. It is also used for receiving the faxes and emails. It is the replacement of dial-
up modems. It is also available online. So there is no need of waiting for a connection
(Soffar, 2015).
Figure 1: Asymmetric digital subscriber line
Question 19
Here they are providing some verify and configuration step of ADSL connection which are
given below:
First, of select, the setting then networks connections in the setting.
Then select the “Local Area Connection” from the left side through “Network Tasks”
for creating a new connection.
Then wizard page will open and will continue to next button.
Question 19
Here they are providing some verify and configuration step of ADSL connection which are
given below:
First, of select, the setting then networks connections in the setting.
Then select the “Local Area Connection” from the left side through “Network Tasks”
for creating a new connection.
Then wizard page will open and will continue to next button.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Now select the radio button of “connect to the internet”.
Then for connecting the connection, select the radio button of setup my connection.
Then select the connect using broadband radio button which requires password and
username.
Then for connecting the connection, select the radio button of setup my connection.
Then select the connect using broadband radio button which requires password and
username.
Then enter password and username and click on next button.
Then last click on the finish button.
The network connection for the window will show as a dial-up connection (Helmig,
2001).
Question 20
Dynamic host configuration protocol is used for providing the server and client protocol. It
provides the internet protocol automatically to the host with related information and IP
address such as default gateway and subnet mask. It is running on UDP’s top. This protocol
logically splits into three altered software’s pieces i.e. DHCP server, DHCP client and DHCP
relay.
Then last click on the finish button.
The network connection for the window will show as a dial-up connection (Helmig,
2001).
Question 20
Dynamic host configuration protocol is used for providing the server and client protocol. It
provides the internet protocol automatically to the host with related information and IP
address such as default gateway and subnet mask. It is running on UDP’s top. This protocol
logically splits into three altered software’s pieces i.e. DHCP server, DHCP client and DHCP
relay.
Benefits:
Dynamic host configuration protocol minimizes the errors of configurations by using
the manual IP address.
It provides the following features for reducing the network administration.
Automated and centralized the TCP/IP Configuration.
By defining the TCP/IP Configuration trough central location (Fisher, 2018).
Question 21. Configured and verified DHCP operation on a router
Answer. For verify and configuration of DHCP operation on the router they use some step
which is given below:
Setup the IP address on the router.
Then create a pool of IP address of DHCP.
Identify subnet and network for the IP address from the pool.
Identify secondary and primary DNS servers.
Identify the default router.
Identify time duration for IP address.
Exit configuration mode from the pool (Davis, 2005).
Figure 2: Configured and verified DHCP operation
Dynamic host configuration protocol minimizes the errors of configurations by using
the manual IP address.
It provides the following features for reducing the network administration.
Automated and centralized the TCP/IP Configuration.
By defining the TCP/IP Configuration trough central location (Fisher, 2018).
Question 21. Configured and verified DHCP operation on a router
Answer. For verify and configuration of DHCP operation on the router they use some step
which is given below:
Setup the IP address on the router.
Then create a pool of IP address of DHCP.
Identify subnet and network for the IP address from the pool.
Identify secondary and primary DNS servers.
Identify the default router.
Identify time duration for IP address.
Exit configuration mode from the pool (Davis, 2005).
Figure 2: Configured and verified DHCP operation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 22
The IP address is used for providing a number to a network which is used for identifying the
particular network.
Static IP address: As the name suggests, that it is the IP address which rarely changes. Once
the IP address is allocated to the element of the network. It will remain the same until any
decision will be made for changing the address of the network. The strength of the static IP
address is 12 number.
Dynamic IP address: It is the totally opposite concept of static IP address. As the name
suggests, that this IP address can change. In the dynamic IP address, IP address is allocated to
different network elements when they use the internet through the internet server (Baker,
2012).
Question 23
NAT is the method which is used to connect the multiple computers through the internet by
using the IP address. It is also known as the IP address overloading and transparent proxy.
NAT provides the facility by which private network’s host can easily connect to the internet’s
host. It also provides the facility that several private IP addresses can translate into one open
IP address. NAT runs on the routers which link the private network to open network. The
main purpose of NAT is inter-domain routing for slowing the depletion of IP address (Doyle
and Carroll, 2002).
Figure 3: NAT Basic Operation
The IP address is used for providing a number to a network which is used for identifying the
particular network.
Static IP address: As the name suggests, that it is the IP address which rarely changes. Once
the IP address is allocated to the element of the network. It will remain the same until any
decision will be made for changing the address of the network. The strength of the static IP
address is 12 number.
Dynamic IP address: It is the totally opposite concept of static IP address. As the name
suggests, that this IP address can change. In the dynamic IP address, IP address is allocated to
different network elements when they use the internet through the internet server (Baker,
2012).
Question 23
NAT is the method which is used to connect the multiple computers through the internet by
using the IP address. It is also known as the IP address overloading and transparent proxy.
NAT provides the facility by which private network’s host can easily connect to the internet’s
host. It also provides the facility that several private IP addresses can translate into one open
IP address. NAT runs on the routers which link the private network to open network. The
main purpose of NAT is inter-domain routing for slowing the depletion of IP address (Doyle
and Carroll, 2002).
Figure 3: NAT Basic Operation
Question 24
The configuration of NAT can be done by using various ways. In the NAT configuration, the
user can configure the NAT’s interface which is used for enabling the security of network
elements. Because in the internet network there are the multiple computers which are
connected to a public IP address. So configuration of NAT is used for security purpose. Here
they are given one example of NAT’s configuration.
The first router of NAT configures to local and inside IP address.
Then it will reside to inside (private) network for registering the IP address.
So it used when local device is the unregistered address for communicating to outside
(public) network (Tyson).
Question 25
After the configuration of NAT, the user must verify NAT’s configuration. That
configuration is properly working or not according to the expectation. The verification
process is given below:
First of all, enable the details of IP NAT it enables the user for verifying the NAT.
Then by using the command, enable the additional information.
Then use the clear command for clear translation of NAT.
Then verify the NAT’s operation by identifying the details of each packet.
Then it will show all the details of the configuration of NAT (Orbit, 2016).
Question 26
Access control lists are used for filtering purpose through switches and some routers to
restrict and permits data flow through the network interface. When ACL is aligned to the
interface. The network device can easily analyze data information which is passing by the
interface. Then ACL compares all the information to defined criteria of ACL. Then it will
provide the permission to data information. So basically it is used for security of the
network’s information.
Types of Access Control Lists:
1. Standard Access control lists:
The configuration of NAT can be done by using various ways. In the NAT configuration, the
user can configure the NAT’s interface which is used for enabling the security of network
elements. Because in the internet network there are the multiple computers which are
connected to a public IP address. So configuration of NAT is used for security purpose. Here
they are given one example of NAT’s configuration.
The first router of NAT configures to local and inside IP address.
Then it will reside to inside (private) network for registering the IP address.
So it used when local device is the unregistered address for communicating to outside
(public) network (Tyson).
Question 25
After the configuration of NAT, the user must verify NAT’s configuration. That
configuration is properly working or not according to the expectation. The verification
process is given below:
First of all, enable the details of IP NAT it enables the user for verifying the NAT.
Then by using the command, enable the additional information.
Then use the clear command for clear translation of NAT.
Then verify the NAT’s operation by identifying the details of each packet.
Then it will show all the details of the configuration of NAT (Orbit, 2016).
Question 26
Access control lists are used for filtering purpose through switches and some routers to
restrict and permits data flow through the network interface. When ACL is aligned to the
interface. The network device can easily analyze data information which is passing by the
interface. Then ACL compares all the information to defined criteria of ACL. Then it will
provide the permission to data information. So basically it is used for security of the
network’s information.
Types of Access Control Lists:
1. Standard Access control lists:
It is used for checking the source address of ACL.
Restricts and permits entire protocol set.
2. Extended Access control lists:
It is used for checking destination and source address.
Generally, restricts and permits specific protocols (Lab, 2015).
Question 27
For configuration of ACL on network filtering they have used some step which is given
below:
First Login to through CLI.
Enter universal configuration mode through AP CLI.
Create a range of time.
Create ACL 101. It will permit the telnet session.
Then apply the time-based ACL.
The requirement of network filtering.
To increase the productivity.
To observe objectionable content.
To increase security (Belosa, 2014).
Question 28
In ACL, IP standard is used for filtering the traffic which is totally based on the range or
single of source IP address that is utilized in the header of the IP packet. Here, destination
address can’t be used in standard ACL. So if it is the method which is used for providing the
security across the several routers in the network system.
Pay attention at the IP standard ACL’s format.
Example. access-list [access-list-number] [deny/permit] [source ip address] [ wildcard mask].
As example show that statement of configuration starts with command of access-list then the
number of ACL. Here, IP standards ACL’s range will be 1 to 99. Then they must be declared
Restricts and permits entire protocol set.
2. Extended Access control lists:
It is used for checking destination and source address.
Generally, restricts and permits specific protocols (Lab, 2015).
Question 27
For configuration of ACL on network filtering they have used some step which is given
below:
First Login to through CLI.
Enter universal configuration mode through AP CLI.
Create a range of time.
Create ACL 101. It will permit the telnet session.
Then apply the time-based ACL.
The requirement of network filtering.
To increase the productivity.
To observe objectionable content.
To increase security (Belosa, 2014).
Question 28
In ACL, IP standard is used for filtering the traffic which is totally based on the range or
single of source IP address that is utilized in the header of the IP packet. Here, destination
address can’t be used in standard ACL. So if it is the method which is used for providing the
security across the several routers in the network system.
Pay attention at the IP standard ACL’s format.
Example. access-list [access-list-number] [deny/permit] [source ip address] [ wildcard mask].
As example show that statement of configuration starts with command of access-list then the
number of ACL. Here, IP standards ACL’s range will be 1 to 99. Then they must be declared
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
a statement of ACL that it will permit or deny IP address. Then finally two portions of the
statement must link with the card mask and IP address (Wilson, 2012).
Question 29
There are some troubleshoot WAN implementation issues which are given below:
IP address mismatching problem
Debugging issues which occurs when the password doesn’t match.
Display neighbouring details.
Display map of frame-relay.
Display running configuration.
Display interface s0.
Encapsulation mismatching of frame relay.
Debugging issues of frame-relay Imi.
Serial interface problem (Stark, 2013).
Question 30
Here they have used some step for resolving the WAN problems which are given below:
1. For removing the WAN issues, first of all, they check the duplex and speed of switch
and routers which are configured with the elements of the network.
2. Then monitoring tools are used for removing the WAN issues which are coming
during the connection. So for that person network administrator will continuously
monitor the WAN connection.
3. Check the configuration and settings of the WAN.
4. Confirm that problems affect the applications or not.
5. Confirm that any MPLS ports will become saturated.
6. Verify that system backups will require.
7. Verify routing tables
8. Check the trends of Long-term activity (Enterprise, 2015).
statement must link with the card mask and IP address (Wilson, 2012).
Question 29
There are some troubleshoot WAN implementation issues which are given below:
IP address mismatching problem
Debugging issues which occurs when the password doesn’t match.
Display neighbouring details.
Display map of frame-relay.
Display running configuration.
Display interface s0.
Encapsulation mismatching of frame relay.
Debugging issues of frame-relay Imi.
Serial interface problem (Stark, 2013).
Question 30
Here they have used some step for resolving the WAN problems which are given below:
1. For removing the WAN issues, first of all, they check the duplex and speed of switch
and routers which are configured with the elements of the network.
2. Then monitoring tools are used for removing the WAN issues which are coming
during the connection. So for that person network administrator will continuously
monitor the WAN connection.
3. Check the configuration and settings of the WAN.
4. Confirm that problems affect the applications or not.
5. Confirm that any MPLS ports will become saturated.
6. Verify that system backups will require.
7. Verify routing tables
8. Check the trends of Long-term activity (Enterprise, 2015).
Question 31
Network documentation of LAN is the technical documentation. It is an exercise which is
used for maintaining the records of LAN. Here some steps are given.
Map the whole network to comprise the hardware details.
Then include the details of servers and backup’s locations.
Include the software information.
Contractor and vendor details.
Agreements of service.
Includes issues and solutions (Sopwith, 2016).
Network documentation of LAN is the technical documentation. It is an exercise which is
used for maintaining the records of LAN. Here some steps are given.
Map the whole network to comprise the hardware details.
Then include the details of servers and backup’s locations.
Include the software information.
Contractor and vendor details.
Agreements of service.
Includes issues and solutions (Sopwith, 2016).
References
Baker, D. (2012). DHCP vs. Static IP—Which Is Better?. [online] Control4. Available at:
https://www.control4.com/blog/61/dhcp-vs-static-ip-which-is-better [Accessed 4 Aug. 2018].
Beloša, I. (2014). Access control lists: what are them and how to configure. [online]
RouterFreak. Available at: https://www.routerfreak.com/understanding-access-control-lists-
acl/ [Accessed 4 Aug. 2018].
Bird, D. and Harwood, M. (2002). Networking Components and Devices | Introduction |
Pearson IT Certification. [online] Pearsonitcertification.com. Available at:
http://www.pearsonitcertification.com/articles/article.aspx?p=30191 [Accessed 4 Aug. 2018].
Davis, D. (2005). Configure DHCP on a Cisco router or switch. [online] TechRepublic.
Available at: https://www.techrepublic.com/article/configure-dhcp-on-a-cisco-router-or-
switch/ [Accessed 4 Aug. 2018].
Doyle, J. and Carroll, J. (2002). Network Address Translation > Operation of NAT. [online]
Ciscopress. Available at: http://www.ciscopress.com/articles/article.asp?p=25273 [Accessed
4 Aug. 2018].
Enterprise. (2015). 8 Simple Steps for Troubleshooting Your WAN | NETSCOUT. [online]
Available at: https://enterprise.netscout.com/cio_brief/8-simple-steps-troubleshooting-wan
[Accessed 4 Aug. 2018].
Fisher, T. (2018). What Is DHCP? (Dynamic Host Configuration Protocol). [online]
Lifewire. Available at: https://www.lifewire.com/what-is-dhcp-2625848 [Accessed 4 Aug.
2018].
Froehlich, A. (2017). WAN Connectivity Options: A Primer. [online] Network Computing.
Available at: https://www.networkcomputing.com/data-centers/wan-connectivity-options-
primer/1872150392 [Accessed 4 Aug. 2018].
Helmig, J. (2001). Configuring broadband Internet Connections (DSL, ADSL via PPoE) in
Wndows XP. [online] TechGenix. Available at: http://techgenix.com/wxpadcon/ [Accessed 4
Aug. 2018].
Baker, D. (2012). DHCP vs. Static IP—Which Is Better?. [online] Control4. Available at:
https://www.control4.com/blog/61/dhcp-vs-static-ip-which-is-better [Accessed 4 Aug. 2018].
Beloša, I. (2014). Access control lists: what are them and how to configure. [online]
RouterFreak. Available at: https://www.routerfreak.com/understanding-access-control-lists-
acl/ [Accessed 4 Aug. 2018].
Bird, D. and Harwood, M. (2002). Networking Components and Devices | Introduction |
Pearson IT Certification. [online] Pearsonitcertification.com. Available at:
http://www.pearsonitcertification.com/articles/article.aspx?p=30191 [Accessed 4 Aug. 2018].
Davis, D. (2005). Configure DHCP on a Cisco router or switch. [online] TechRepublic.
Available at: https://www.techrepublic.com/article/configure-dhcp-on-a-cisco-router-or-
switch/ [Accessed 4 Aug. 2018].
Doyle, J. and Carroll, J. (2002). Network Address Translation > Operation of NAT. [online]
Ciscopress. Available at: http://www.ciscopress.com/articles/article.asp?p=25273 [Accessed
4 Aug. 2018].
Enterprise. (2015). 8 Simple Steps for Troubleshooting Your WAN | NETSCOUT. [online]
Available at: https://enterprise.netscout.com/cio_brief/8-simple-steps-troubleshooting-wan
[Accessed 4 Aug. 2018].
Fisher, T. (2018). What Is DHCP? (Dynamic Host Configuration Protocol). [online]
Lifewire. Available at: https://www.lifewire.com/what-is-dhcp-2625848 [Accessed 4 Aug.
2018].
Froehlich, A. (2017). WAN Connectivity Options: A Primer. [online] Network Computing.
Available at: https://www.networkcomputing.com/data-centers/wan-connectivity-options-
primer/1872150392 [Accessed 4 Aug. 2018].
Helmig, J. (2001). Configuring broadband Internet Connections (DSL, ADSL via PPoE) in
Wndows XP. [online] TechGenix. Available at: http://techgenix.com/wxpadcon/ [Accessed 4
Aug. 2018].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Jisc (2015). Laws relevant to networking and computing. [online] Jisc. Available at:
https://www.jisc.ac.uk/guides/networking-computers-and-the-law/laws [Accessed 4 Aug.
2018].
Lab, N. (2015). Access Control List & its Types. [online] Slideshare.net. Available at:
https://www.slideshare.net/Netwaxlab/7-access-control-list-its-types [Accessed 4 Aug. 2018].
MustBeGeek. (2015). Configure Site to Site IPSec VPN Tunnel in Cisco IOS Router. [online]
Available at: http://www.mustbegeek.com/configure-site-to-site-ipsec-vpn-tunnel-in-cisco-
ios-router/ [Accessed 4 Aug. 2018].
orbit. (2015). What is NAT? How to Troubleshoot and Verify NAT Configuration. [online]
Available at: http://www.orbit-computer-solutions.com/verifying-and-troubleshooting-nat-
configuration/ [Accessed 4 Aug. 2018].
Soffar, H. (2015). Asymmetric Digital Subscriber Line (ADSL) advantages and
disadvantages | Science online. [online] Science online. Available at: https://www.online-
sciences.com/computer/asymmetric-digital-subscriber-line-adsl-advantages-and-
disadvantages/ [Accessed 4 Aug. 2018].
Sopwith, T. (2016). How To: Document a Local Area Network (LAN) - IT Glue. [online] IT
Glue. Available at: https://itglue.com/blog/how-to-document-local-area-network/ [Accessed 4
Aug. 2018].
Stark, C. (2013). Cisco ICND2 - Troubleshoot WAN implementation issues. [online] CHRIS
STARK. Available at: http://chrisstark.co/2013/04/cisco-icnd2-troubleshoot-wan-
implementation-issues/ [Accessed 4 Aug. 2018].
Tyson, J. (n.d.). How Network Address Translation Works. [online] HowStuffWorks.
Available at: https://computer.howstuffworks.com/nat2.htm [Accessed 4 Aug. 2018].
Wilson, T. (2012). Securing Networks Access List Implementation on Cisco Routers. [online]
Pluralsight.com. Available at: https://www.pluralsight.com/blog/it-ops/access-control-list-
implementation-on-cisco-routers [Accessed 4 Aug. 2018].
https://www.jisc.ac.uk/guides/networking-computers-and-the-law/laws [Accessed 4 Aug.
2018].
Lab, N. (2015). Access Control List & its Types. [online] Slideshare.net. Available at:
https://www.slideshare.net/Netwaxlab/7-access-control-list-its-types [Accessed 4 Aug. 2018].
MustBeGeek. (2015). Configure Site to Site IPSec VPN Tunnel in Cisco IOS Router. [online]
Available at: http://www.mustbegeek.com/configure-site-to-site-ipsec-vpn-tunnel-in-cisco-
ios-router/ [Accessed 4 Aug. 2018].
orbit. (2015). What is NAT? How to Troubleshoot and Verify NAT Configuration. [online]
Available at: http://www.orbit-computer-solutions.com/verifying-and-troubleshooting-nat-
configuration/ [Accessed 4 Aug. 2018].
Soffar, H. (2015). Asymmetric Digital Subscriber Line (ADSL) advantages and
disadvantages | Science online. [online] Science online. Available at: https://www.online-
sciences.com/computer/asymmetric-digital-subscriber-line-adsl-advantages-and-
disadvantages/ [Accessed 4 Aug. 2018].
Sopwith, T. (2016). How To: Document a Local Area Network (LAN) - IT Glue. [online] IT
Glue. Available at: https://itglue.com/blog/how-to-document-local-area-network/ [Accessed 4
Aug. 2018].
Stark, C. (2013). Cisco ICND2 - Troubleshoot WAN implementation issues. [online] CHRIS
STARK. Available at: http://chrisstark.co/2013/04/cisco-icnd2-troubleshoot-wan-
implementation-issues/ [Accessed 4 Aug. 2018].
Tyson, J. (n.d.). How Network Address Translation Works. [online] HowStuffWorks.
Available at: https://computer.howstuffworks.com/nat2.htm [Accessed 4 Aug. 2018].
Wilson, T. (2012). Securing Networks Access List Implementation on Cisco Routers. [online]
Pluralsight.com. Available at: https://www.pluralsight.com/blog/it-ops/access-control-list-
implementation-on-cisco-routers [Accessed 4 Aug. 2018].
Acme (2017). Network codes and standards | ACMA. [online] Acma.gov.au. Available at:
https://www.acma.gov.au/Industry/Telco/Infrastructure/Network-facilities/network-codes-
and-standards [Accessed 4 Aug. 2018].
Paquet, C. (2013). Security Policies > Network Security Concepts and Policies. [online]
Ciscopress.com. Available at: http://www.ciscopress.com/articles/article.asp?
p=1998559&seqNum=3 [Accessed 4 Aug. 2018].
Partsenidis, C. (2003). What are the benefits and drawbacks of Logical Network Design?.
[online] SearchNetworking. Available at:
https://searchnetworking.techtarget.com/answer/What-are-the-benefits-and-drawbacks-of-
Logical-Network-Design [Accessed 4 Aug. 2018].
https://www.acma.gov.au/Industry/Telco/Infrastructure/Network-facilities/network-codes-
and-standards [Accessed 4 Aug. 2018].
Paquet, C. (2013). Security Policies > Network Security Concepts and Policies. [online]
Ciscopress.com. Available at: http://www.ciscopress.com/articles/article.asp?
p=1998559&seqNum=3 [Accessed 4 Aug. 2018].
Partsenidis, C. (2003). What are the benefits and drawbacks of Logical Network Design?.
[online] SearchNetworking. Available at:
https://searchnetworking.techtarget.com/answer/What-are-the-benefits-and-drawbacks-of-
Logical-Network-Design [Accessed 4 Aug. 2018].
1 out of 24
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.